Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory J McHugh ACM Transactions on Information and System Security (TISSEC) 3 (4), 262-294, 2000 | 1913 | 2000 |
State of the practice of intrusion detection technologies J Allen, A Christie, W Fithen, J McHugh, J Pickel (No Title), 2000 | 719 | 2000 |
Windows of vulnerability: A case study analysis WA Arbaugh, WL Fithen, J McHugh Computer 33 (12), 52-59, 2000 | 449 | 2000 |
Defending yourself: The role of intrusion detection systems J McHugh, A Christie, J Allen IEEE software 17 (5), 42-51, 2000 | 416 | 2000 |
Intrusion and intrusion detection J McHugh International Journal of Information Security 1, 14-35, 2001 | 350 | 2001 |
A cautionary note on image downgrading. CW Kurak Jr, J McHugh ACSAC, 153-159, 1992 | 316 | 1992 |
Survivable network analysis method NR Mead, RJ Ellison, RC Linger, T Longstaff, J McHugh CMU/SEI, 2000 | 168 | 2000 |
A trend analysis of exploitations HK Browne, WA Arbaugh, J McHugh, WL Fithen Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 214-229, 2000 | 156 | 2000 |
The 1998 Lincoln laboratory IDS evaluation: a critique J McHugh Recent Advances in Intrusion Detection: Third International Workshop, RAID …, 2000 | 145 | 2000 |
A human capital model for mitigating security analyst burnout SC Sundaramurthy, AG Bardas, J Case, X Ou, M Wesch, J McHugh, ... Eleventh symposium on usable privacy and security (SOUPS 2015), 347-359, 2015 | 122 | 2015 |
An experience using two covert channel analysis techniques on a real system design JT Haigh, RA Kemmerer, J McHugh, WD Young IEEE Transactions on Software Engineering, 157-168, 1987 | 96 | 1987 |
Sybil attacks as a mitigation strategy against the storm botnet CR Davis, JM Fernandez, S Neville, J McHugh 2008 3rd International Conference on Malicious and Unwanted Software …, 2008 | 93 | 2008 |
Turning contradictions into innovations or: How we learned to stop whining and improve security operations SC Sundaramurthy, J McHugh, X Ou, M Wesch, AG Bardas, ... Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 237-251, 2016 | 90 | 2016 |
Flovis: Flow visualization system T Taylor, D Paterson, J Glanfield, C Gates, S Brooks, J McHugh 2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009 | 86 | 2009 |
Hiding intrusions: From the abnormal to the normal and beyond K Tan, J McHugh, K Killourhy Information Hiding: 5th International Workshop, IH 2002 Noordwijkerhout, The …, 2003 | 86 | 2003 |
Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures? CR Davis, S Neville, JM Fernandez, JM Robert, J McHugh Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008 | 65 | 2008 |
Quality of protection: measuring the unmeasurable? J McHugh Proceedings of the 2nd ACM workshop on Quality of protection, 1-2, 2006 | 56 | 2006 |
An anthropological approach to studying CSIRTs SC Sundaramurthy, J McHugh, XS Ou, SR Rajagopalan, M Wesch IEEE Security & Privacy 12 (5), 52-60, 2014 | 54 | 2014 |
Business representation in the UK since 1979: the case of trade associations TC May, J McHugh, T Taylor Political Studies 46 (2), 260-275, 1998 | 53 | 1998 |
Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing S Krishnan, T Taylor, F Monrose, J McHugh 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013 | 46 | 2013 |